Buddy Bertram on Ingress and Return Path Analysis
One of the big questions being asked by providers is how do I handle ingress encountered in the reverse path? To their exasperation, many are finding that there’s not an easy solution to this question. Different types of spectrum analyzers address different issues and return path monitoring systems require hardware and hassle and are prohibitively expensive for most operators. However, with the Broadcom chipset technology used in most DOCSIS 2.0 and 3.0 CMTSs and in conjunction with a product like ZCorum’s Upstream Analyzer, cable operators can now use their current CMTS as the spectrum analyzer without the need to purchase additional expensive hardware or introducing more points of failure into the plant. Utilizing this technology in conjunction with a software-based spectrum analyzer, providers can see the signals and noise floor from a remote location on everyday mobile devices (smartphones, tablets, laptops) or desktop computers.
We sat down with Buddy Bertram, ZCorum’s Director of Technology to talk about the basics of ingress and how to handle it.
Question: We know the dominant problem that operators are having with the upstream path has to do primarily with ingress. This is due to something called the noise funneling effect of the upstream path. Can you explain what this means?
Answer: The noise-funneling effect is described as the increase in the ingress noise levels as the number of homes passed is increased. You get noise from every home and, because of the noise funneling nature of a cable plant, noise from one source can, and does affect everyone. All signals from every subscriber’s home are funneled back to the headend or hub site to a single point. That single point is the CMTS.
Question: Subscribers impacted by noise would most likely complain about what issues?
Answer: The most common noise interference shows up as interference to the subscriber's TV reception. But noise also disrupts Internet connections or causes dropped phone calls. In the forward path, as noise levels rise, there will be visible degrading of the picture quality or slow Internet. It will be gradual but the provider will start getting calls.
It’s different in the world of the return path. The effect of high levels of noise and ingress may not even be noticed by the subscriber until they completely destroy communications or drastically slow down network performance. And trying to find the source after the fact eats up time and resources. Not to mention how frustrating it is for the field techs.
Question: Where does the noise come from?
Answer: Aside from the licensed sources of noise such as HAM radio use, LTE towers and their handsets, there are even more sources of noise. The license-free transmitters used in walkie-talkies, garage-door openers, video games, and other unlicensed, low-power radio transmitters can generate noise. Unintentional sources of noise include computer equipment, microprocessor circuits used in consumer electronics equipment or security-alarm systems, motors, neon signs, thermostats, touch-to-switch lamps, the electrical-power distribution system and even the new radio-frequency powered street lights.
Question: How does noise get in?
Answer: Just as with anything, there has to be an opening somewhere for something to get in or out. Whenever there’s a breach in the cable system, you get cable signal leaks and wherever cable signals leak out, noise can get in. Cable signal leaks occur when the RF signals transmitted within a cable system are not properly contained within the cable plant. These leaks can be caused by loose connectors, damaged and cracked or unterminated cables. One piece of bad cable or one poor connection can wipe out an entire node for upstream services.
Question: How long does it typically take a field tech to troubleshoot for the source of ingress?
Answer: It can take a technician from two hours to two days or more sometimes to find a single ingress source and weeks to find them all in a block of homes. And all the time it’s being investigated the subscribers could have poor TV reception, slow internet and having their phone calls drop off in the middle of a conversation.
Question: Can’t techs just see the ingress on a meter?
Answer: The problem with trying to troubleshoot ingress is that most ingress problems are intermittent. Just as a tech lugs a heavy piece of equipment to a site and gets close to the problem, it goes away, and he has to wait for it to show up again, hopefully today, maybe tomorrow. So it’s a wasted truck roll with nothing resolved. That’s one of the big advantages to having a software-based analyzer that remotely detects the noise. A tech can analyze the data at his computer before leaving the office. While he’s in the field he can check the noise levels on his phone or tablet from any location where he has internet access. So even if the noise is happening at another location he can still check it before he goes on that call and he’ll have a picture of what’s happening before he gets there.
Question: What about checking for leakage, wouldn’t that find the source?
Answer: Checking for leakage is a good way to find sources of ingress, but it is not 100 percent effective. In the case of very small leaks or ingress points, a lower level forward path signal may not leak out, but an external signal source (for example, a nearby CB or ham radio signal or electric heater) may produce a strong enough signal that ingress results. So in some cases, a leakage meter alone may not find all the ingress points.
Question: Is any method “100% effective” for finding the ingress problem?
Answer: Software with the ability to scan the return spectrum and display the signals provides an excellent method for identifying and finding ingress. The best software will provide a display of the return spectrum and display the noise under the carrier with 100% accuracy. Unfortunately not all software-based analyzers have this capability. With software like this, providers cut down on time and resources in the field while they’re proactively maintaining the stability of their cable plant. Imagine how easy it would be for an installer to pull out his tablet or smartphone to check for noise under the carrier before hooking the subscriber to the tap. With access to subscribers' homes very limited, operators must take advantage when access is given and the best time is during the installation.
Interested in more on this topic? We have an excellent paper written by Brady Volpe from the Volpe Firm on identifying ingress in the return path. Download your copy here, compliments of ZCorum.
Dennis “Buddy” Bertram, Vice President of Technology
A veteran of the IT and cable industries, Dennis “Buddy” Bertram has been with ZCorum fifteen years. He joined ZCorum in 2001 as a network engineer and now serves as the Vice President of Technology. Buddy currently heads up ZCorum’s engineering department and oversees a team of network engineers that designs networks for ZCorum’s affiliates.
Prior to joining ZCorum, Buddy learned the cable business at Cablevision in Pennsylvania, where he served in nearly every department of the cable company, gaining firsthand knowledge of how cable companies operate. Buddy and his wife have been married 18 years and they are avid motorcycle enthusiasts and spend a lot of time on the open road.
About the Author: Marsha Hemmerich
Never miss a post.
Enter your email to subscribe:
- Ask an Expert (12)
- Blog (12)
- Technology (11)
- Hot Topics (8)
- ask a broadband expert (8)
- DOCSIS (7)
- PNM (7)
- proactive network maintenance (7)
- Industry Perspectives (5)
- BEAD (4)
- Broadband Funding (4)
- Customer Service (4)
- FCC (4)
- IIJA (4)
- PreEqualization Analyzer (4)
- correlation groups (4)
- fiber broadband (4)
- fiber optics (4)
- fiber troubleshooting (4)
- interview (4)
- CGNAT (3)
- Carrier Grade NAT (3)
- DDoS Attacks (3)
- DOCSIS pre-equalization (3)
- Diagnostics (3)
- Distributed Denial of Service Attacks (3)
- GPoN (3)
- IPv4 Conservation (3)
- Purchase IPv4 Addresses (3)
- What is DOCSIS PNM (3)
- broadband infrastructure funding (3)
- fiber (3)
- 5G (2)
- CALEA (2)
- CALEA Compliance (2)
- Codeword Errors (2)
- DOCSIS 3.1 (2)
- Distributed Access Architecture (2)
- Group Delay (2)
- ICFR (2)
- IP traffic (2)
- IPv6 migration (2)
- In Channel Frequency Response (2)
- Main Tap Compression (2)
- Marketing (2)
- Micro Reflections (2)
- Millimeter Wave (2)
- OTT (2)
- Rural Broadband (2)
- Types of DDoS Attacks (2)
- Voice Service (2)
- XGS-PON (2)
- broadband data collection (2)
- customer service (2)
- internet issues (2)
- mid-band spectrum (2)
- mmWave (2)
- network traffic (2)
- network virtualization (2)
- state broadband (2)
- state broadband program (2)
- weather-related Internet issues (2)
- 10G (1)
- BDC (1)
- BDC Availability Data Specification (1)
- BDC User Guide (1)
- BEAD Funding (1)
- Broadband Providers (1)
- Broadband Serviceable Location Fabric (1)
- Broadband Serviceable Locations (1)
- C-Band (1)
- CA Certificate Expiration (1)
- CAF II Requirements (1)
- CAF II Testing (1)
- CALEA SSI Plan (1)
- CBRS (1)
- Carpet Bombing (1)
- Citizens Broadband Radio (1)
- Communications Assistance for Law Enforcement Act (1)
- Connect America Fund (1)
- DAA (1)
- DOCSIS 4.0 (1)
- DOCSIS CA Certificate Expiration (1)
- DPoE (1)
- DPoG (1)
- EPoN (1)
- Excel Text Matching (1)
- Extended Spectrum DOCSIS (1)
- Extending HFC Life (1)
- FCC Broadband Map (1)
- FCC data (1)
- FTTH (1)
- FTTx (1)
- Fidelity Communications (1)
- Full Duplex (1)
- Greenfield Broadband (1)
- Hosted VoIP (1)
- IPTV (1)
- IPv4 (1)
- IPv6 (1)
- IPv6 Transition Plan (1)
- LTE (1)
- Low Latency DOCSIS (1)
- MAC/PHY (1)
- Mobile (1)
- Monitoring (1)
- Motivation for DDoS Attacks (1)
- Multi-Vector DDoS Attacks (1)
- NG-PON2 (1)
- NIST (1)
- NIST Cybersecurity Framework (1)
- NIST requirements (1)
- NetFlow (1)
- Network Traffic Management, (1)
- OTT video streaming (1)
- Private Access License (PAL) (1)
- RDOF Auction (1)
- RDOF Voice Requirements (1)
- Remote MAC/PHY (1)
- Remote PHY (1)
- Robocalls (1)
- Rural Broadband Network Advancement Act (1)
- Rural Digital Opportunity Fund (1)
- SSI (1)
- STIR/SHAKEN (1)
- Small Cells (1)
- Streaming (1)
- System Security and Integrity Plan (1)
- TV Viewership Analytics (1)
- TWDM-PON (1)
- TruVizion (1)
- Underserved Locations (1)
- Unserved Locations (1)
- Upstream Analyzer (1)
- Videos (1)
- VoIP (1)
- VoIP revenue (1)
- Wired Broadband (1)
- broadband data collection program (1)
- broadband deployment (1)
- broadband support (1)
- cableLabs (1)
- caf ii (1)
- case study (1)
- cloud-based VoIP (1)
- commercial VoIP (1)
- commercial VoIP revenue (1)
- cpe spectrum capture (1)
- customer service tip (1)
- cyber attacks (1)
- cybersecurity (1)
- dhcp (1)
- downstream spectrum issues (1)
- dual stack implementation (1)
- dynamic spectrum sharing (1)
- electric membership cooperatives (1)
- fiber Internet (1)
- fiber deployment (1)
- forward path monitoring (1)
- free download (1)
- full band capture (1)
- holiday customer service (1)
- holiday tech support (1)
- ingress (1)
- middle mile grant program (1)
- net neutrality (1)
- open access fiber (1)
- open access fiber network (1)
- open access networks (1)
- pppoa (1)
- pppoe (1)
- pre-equalization (1)
- reduced maintenance costs (1)
- remote spectrum analyzer (1)
- return path (1)
- scott helms (1)
- technical paper (1)
- technical support (1)
- vTDR (1)
.
About the Blog
Bloggers
Comments Policy
Guest Blogging
Privacy Policy
Leave a comment: